Stuxnet, the worldâ€™s first known â€œcyber missile,â€ was designed to sabotage special power supplies used almost exclusively in nuclear fuel-refining centrifuge systems, researchers studying its code have revealed. The discovery is another puzzle piece experts say points to Iranâ€™s nuclear centrifuge plants as the likely target.
While the discovery may seem just another bit of circumstantial evidence, it is a critical one that appears to all but answer a central mystery surrounding Stuxnet: What was its target? Stuxnet was discovered in June by a Belarus antivirus company, and its unique ability to control industrial processes was uncovered by US researchers in July. But its true role as the worldâ€™s first publicly known cyber super weapon â€“ designed to cross the digital divide and destroy a very specific target in the real world â€“ was only revealed in September. Even then, the target was mostly an informed guess. Was Iranâ€™s Bushehr nuclear power plant or its nuclear centrifuge fuel-refining plant at Natanz the target, as some suggested? Or was it something quite different, like the big Indian-made satellite that failed dramatically in July?
It now appears that a smoking gun within Stuxnetâ€™s software code targets power supplies almost certainly used inside any Iranian nuclear fuel refining plant, researchers say. Working separately, researchers at California computer security firm Symantec arrived at the same conclusion as researchers in Germany late last week: Nuclear-fuel centrifuges were the target. The researchers followed a complex trail. After cleverly gaining access to computer systems using an array of devious â€œexploits,â€ Stuxnet searches for and infects only a specific Siemens-made programmable logic controller (PLC) performing specific functions, the researchers found. Then â€“ and this is the part just unearthed â€“ it hunts for identification numbers unique to a special kind of â€œfrequency converter driveâ€ made by just two firms in the world: one headquartered in Finland, the other in Tehran.
Frequency converter drives are a kind of power supply that can change the frequency of its output to control the speed of a motor. The drive responds to a PLCâ€™s computer commands and is used for industrial control in factory settings worldwide. Stuxnet hunts for specific drives set at specific speeds â€“ the very high speeds a centrifuge must achieve to physically separate and concentrate uranium isotopes for use as nuclear fuel. Such fuel can then be used in a reactor or, if refined to far higher concentrations, a nuclear weapon. [Editorâ€™s note: The original version misconstrued the nature of frequency converter drives.]
Symantec researchers were aided by a Dutch industrial control systems expert who revealed the connection with Tehran and Finland firms. It turns out that the special drives Stuxnet targets are built to operate â€œat very high speeds … speeds used only in a limited number of applications,â€ Symantec stated in a report update Nov. 12. Such drives are â€œregulated for export in the US by the Nuclear Regulatory Commission,â€ because one of their main uses is for uranium enrichment, it noted.
Once Stuxnet has locked its sights on the target, it alternately brings the centrifuge process to either a grinding slowdown or an explosive surge â€“ by sabotaging the centrifuge refining process. It tells the commandeered PLC to force the frequency converter drive to do something itâ€™s not ever supposed to do: Switch back and forth from high speed to low speed at intervals punctuated by long period of normal operation. It also occasionally pushes the centrifuge to far exceed its maximum speed.
â€œStuxnet changes the output frequencies and thus the speed of the motors for short intervals over periods of months,â€ Symantec researcher Eric Chien reported Nov. 12 on his blog. â€œInterfering with the speed of the motors sabotages the normal operation of the industrial control process.â€
Normal operating frequency of the special drive is supposed to be between 807 and 1210 Hz â€“ the higher the hertz, the higher the speed. One hertz means that a cycle is repeated once per second. Stuxnet â€œsabotages the system by slowing down or speeding up the motor to different rates at different times,â€ including sending it up to 1410 Hz, well beyond its intended maximum speed. Such wide swings would probably destroy the centrifuge â€“ or at least wreck its ability to produce refined uranium fuel, others researchers say.
â€œOne reasonable goal for the attack could be to destroy the centrifuge rotor by vibration, which causes the centrifuge to explodeâ€ as well as simply degrading the output subtly over time, Ralph Langner, the German researcher who first revealed Stuxnetâ€™s function as a weapon in mid-September, wrote on his blog last week.
All of the circumstantial evidence points in the same direction: Natanz.
The Natanz nuclear centrifuge fuel-refining plant may have been hit first by Stuxnet in mid-2009, said Frank Rieger, a German researcher with Berlin encryption firm GSMK. The International Atomic Energy Agency found a sudden drop in the number of working centrifuges at the Natanz site, he noted in an interview in September.
â€œIt seems like the parts of Stuxnet dealing with PLCs have been designed to work on multiple nodes at once â€“ which makes it fit well with a centrifuge plant like Natanz,â€ Mr. Rieger says. By contrast, Bushehr is a big central facility with many disparate PLCs performing many different functions. Stuxnet seems focused on replicating its intrusion across a lot of identical units in a single plant, he said. That and Symantecâ€™s new findings also dovetail nicely with Mr. Langnerâ€™s detailed findings in his ongoing dissection of Stuxnet. Parts of the code show Stuxnet causing problems for short periods, then resuming undisturbed operation, Symantecâ€™s findings show. As a result, Langner writes, â€œthe victim, having no clue of being under a cyber attack, will replace broken centrifuges by new ones â€“ until ending in frustration. Itâ€™s like a Chinese water torture.â€
Ultimately, the Stuxnet cyber attack â€œis as good as using explosives,â€ Langner notes. Actually, itâ€™s even better, he writes. Iran is believed to have other hidden centrifuge plants and â€œwith a well designed attack plan, you even hit the unknown facilities.â€